exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files Date: 2011-09-09 to 2011-09-10

Secunia Security Advisory 45948
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for pl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | f719a124972aee8247c565e3f572cd663cbf0b7a978737c4b7560c8e9d2a0c1d
Secunia Security Advisory 45943
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for pure-ftpd. This fixes a vulnerability, which can be exploited by malicious, local users and malicious people to manipulate certain data.

tags | advisory, local
systems | linux, suse
SHA-256 | cef00ed956fe609457e037c01ddd6d61af27ce11d8f0dcd61495b6a0ee6345bd
Secunia Security Advisory 45853
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in the Font resizer extension for TYPO3, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 64e3e2b1cc01af600c5a328a87457754c6195d567549fcd874af630e6bf0efe3
Secunia Security Advisory 45886
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Qemu, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 81cf89191f5c10bb6ec39a2feb08f4bcc562dd797f0280c5f1bdb399fec6a849
Secunia Security Advisory 45877
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in librsvg, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | 053214e268012d1508a39659254b71200aae1a328667ea5318c6d8a4fe7ef3dd
Secunia Security Advisory 45958
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Spring Security, which can be exploited by malicious people to gain escalated privileges, conduct HTTP header injection attacks, and bypass certain security restrictions.

tags | advisory, web, vulnerability
SHA-256 | 03723d87ddd2f054dfc87bc7bac85dc867b1ef33bb1e0193708aae73ffb2dad2
Secunia Security Advisory 45957
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Spring Framework, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | dbf868c8f5f07097b1564c14320505cac1a52d82a78191d218f56f04cc9a009c
Secunia Security Advisory 45942
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Spring Framework, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 9c4bc3d379b03fdafe15e48ded0b2b6fa451ca35867684410021ec24cdf3f89d
Secunia Security Advisory 45955
Posted Sep 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered multiple vulnerabilities in LightNEasy, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 066bd7f36613f4458e7d03fc3cf791807c9a116b85790b665efb0ddf20e3340f
LightNEasy 3.2.4 Cross Site Scripting
Posted Sep 9, 2011
Authored by Stefan Schurtz

LightNEasy version 3.2.4 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | dc12652902060df64ea9b59784708a1e563eb8e1f5c0c3571120d2d9f2ab205c
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close